Vulnerabilities (CVE)

Filtered by CWE-248
Total 79 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-6533 1 Silabs 1 Z-wave Pc-based Controller 2025-02-12 N/A 6.5 MEDIUM
Malformed Device Reset Locally Command Class packets can be sent to the controller, causing the controller to assume the end device has left the network. After this, frames sent by the end device will not be acknowledged by the controller. This vulnerability exists in PC Controller v5.54.0, and earlier.
CVE-2023-6640 1 Silabs 1 Z-wave Pc-based Controller 2025-02-12 N/A 6.5 MEDIUM
Malformed S2 Nonce Get Command Class packets can be sent to crash PC Controller v5.54.0 and earlier.
CVE-2025-0158 2025-02-06 N/A 5.5 MEDIUM
IBM EntireX 11.1 could allow a local user to cause a denial of service due to an unhandled error and fault isolation.
CVE-2024-3052 2025-02-05 N/A 7.5 HIGH
Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway.
CVE-2023-21087 1 Google 1 Android 2025-02-05 N/A 5.5 MEDIUM
In PreferencesHelper.java, an uncaught exception may cause the device to get stuck in a boot loop. This could lead to local persistent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261723753
CVE-2024-23449 1 Elastic 1 Elasticsearch 2025-02-04 N/A 4.3 MEDIUM
An uncaught exception in Elasticsearch >= 8.4.0 and < 8.11.1 occurs when an encrypted PDF is passed to an attachment processor through the REST API. The Elasticsearch ingest node that attempts to parse the PDF file will crash. This does not happen with password-protected PDF files or with unencrypted PDF files.
CVE-2025-24883 2025-01-30 N/A N/A
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.14.13.
CVE-2024-31904 1 Ibm 1 App Connect Enterprise 2025-01-07 N/A 6.5 MEDIUM
IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 through 12.0.12.0 integration nodes could allow an authenticated user to cause a denial of service due to an uncaught exception. IBM X-Force ID: 289647.
CVE-2024-21983 1 Netapp 1 Storagegrid 2024-12-13 N/A 6.5 MEDIUM
StorageGRID (formerly StorageGRID Webscale) versions prior to 11.8 are susceptible to a Denial of Service (DoS) vulnerability. Successful exploit by an authenticated attacker could lead to an out of memory condition or node reboot.
CVE-2024-54106 1 Huawei 1 Harmonyos 2024-12-12 N/A 7.1 HIGH
Null pointer dereference vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.
CVE-2024-32995 1 Huawei 2 Emui, Harmonyos 2024-12-11 N/A 6.2 MEDIUM
Denial of service (DoS) vulnerability in the AMS module Impact: Successful exploitation of this vulnerability will affect availability.
CVE-2024-11738 2024-12-06 N/A 5.3 MEDIUM
A flaw was found in Rustls 0.23.13 and related APIs. This vulnerability allows denial of service (panic) via a fragmented TLS ClientHello message.
CVE-2024-20137 2024-12-02 N/A 7.5 HIGH
In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727.
CVE-2024-28835 2024-11-22 N/A 5.0 MEDIUM
A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
CVE-2024-3051 2024-11-21 N/A 7.5 HIGH
Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.
CVE-2024-38525 2024-11-21 N/A 7.5 HIGH
dd-trace-cpp is the Datadog distributed tracing for C++. When the library fails to extract trace context due to malformed unicode, it logs the list of audited headers and their values using the `nlohmann` JSON library. However, due to the way the JSON library is invoked, it throws an uncaught exception, which results in a crash. This vulnerability has been patched in version 0.2.2.
CVE-2024-34363 1 Envoyproxy 1 Envoy 2024-11-21 N/A 7.5 HIGH
Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash.
CVE-2024-31217 1 Strapi 1 Strapi 2024-11-21 N/A 5.3 MEDIUM
Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.
CVE-2023-5310 1 Silabs 3 Z-wave Long Range 700, Z-wave Long Range 800, Z-wave Software Development Kit 2024-11-21 N/A 5.7 MEDIUM
A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.
CVE-2023-5038 1 Hanwhavision 366 Ane-l6012r, Ane-l6012r Firmware, Ane-l7012r and 363 more 2024-11-21 N/A 7.5 HIGH
badmonkey, a Security Researcher has found a flaw that allows for a unauthenticated DoS attack on the camera. An attacker runs a crafted URL, nobody can access the web management page of the camera. and must manually restart the device or re-power it. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.